The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users to delete their accounts without requiring password re-authentication. An attacker with temporary access to an authenticated session (e.g., on a shared/public machine) could permanently delete the user’s account without knowledge of the password. This bypass of re-authentication puts users at risk of account loss and data disruption. Version 1.1.0.3 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 02 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 02 Jun 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The CE Phoenix eCommerce platform, starting in version 1.0.9.7 and prior to version 1.1.0.3, allowed logged-in users to delete their accounts without requiring password re-authentication. An attacker with temporary access to an authenticated session (e.g., on a shared/public machine) could permanently delete the user’s account without knowledge of the password. This bypass of re-authentication puts users at risk of account loss and data disruption. Version 1.1.0.3 contains a patch for the issue. | |
Title | PhoenixCart Vulnerable to Account Deletion Without Password Confirmation | |
Weaknesses | CWE-306 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-02T10:47:53.761Z
Updated: 2025-06-02T11:43:22.588Z
Reserved: 2025-05-05T16:53:10.372Z
Link: CVE-2025-47272

Updated: 2025-06-02T11:43:18.562Z

Status : Awaiting Analysis
Published: 2025-06-02T11:15:22.557
Modified: 2025-06-02T17:32:17.397
Link: CVE-2025-47272

No data.